Users Guide

Showing IPv6 Routes...............................................................................................................................................466
Showing the Running-Configuration for an Interface...................................................................................... 467
Clearing IPv6 Routes................................................................................................................................................468
Disabling ND Entry Timeout....................................................................................................................................468
Configuring IPv6 RA Guard.......................................................................................................................................... 468
Configuring IPv6 RA Guard on an Interface....................................................................................................... 470
Monitoring IPv6 RA Guard......................................................................................................................................470
Chapter 26: iSCSI Optimization..................................................................................................471
iSCSI Optimization Overview........................................................................................................................................471
Monitoring iSCSI Traffic Flows.............................................................................................................................. 472
Application of Quality of Service to iSCSI Traffic Flows................................................................................. 473
Information Monitored in iSCSI Traffic Flows.................................................................................................... 473
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................474
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................474
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...........................................................474
Enable and Disable iSCSI Optimization................................................................................................................ 475
Default iSCSI Optimization Values..............................................................................................................................475
iSCSI Optimization Prerequisites.................................................................................................................................476
Configuring iSCSI Optimization................................................................................................................................... 476
Displaying iSCSI Optimization Information................................................................................................................478
Chapter 27: Intermediate System to Intermediate System.........................................................480
IS-IS Protocol Overview................................................................................................................................................480
IS-IS Addressing..............................................................................................................................................................480
Multi-Topology IS-IS....................................................................................................................................................... 481
Transition Mode......................................................................................................................................................... 481
Interface Support.......................................................................................................................................................481
Adjacencies..................................................................................................................................................................481
Graceful Restart..............................................................................................................................................................482
Timers.......................................................................................................................................................................... 482
Implementation Information..........................................................................................................................................482
Configuration Information.............................................................................................................................................483
Configuration Tasks for IS-IS.................................................................................................................................483
Configuring the Distance of a Route....................................................................................................................490
Changing the IS-Type.............................................................................................................................................. 490
Redistributing IPv4 Routes..................................................................................................................................... 493
Redistributing IPv6 Routes..................................................................................................................................... 493
Configuring Authentication Passwords............................................................................................................... 494
Setting the Overload Bit..........................................................................................................................................494
Debugging IS-IS.........................................................................................................................................................495
IS-IS Metric Styles..........................................................................................................................................................496
Configure Metric Values................................................................................................................................................496
Maximum Values in the Routing Table.................................................................................................................496
Change the IS-IS Metric Style in One Level Only............................................................................................. 496
Leaks from One Level to Another......................................................................................................................... 498
Sample Configurations...................................................................................................................................................498
Chapter 28: Link Aggregation Control Protocol (LACP)............................................................. 501
Contents
15